Description
Book SynopsisDr. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 18 textbooks and, counting revised editions, a total of 70 books on various aspects of these subjects. His writings have appeared in numerous ACM and IEEE publications, including the
Proceedings of the IEEE and
ACM Computing Reviews. He has 13 times received the award for the best computer science textbook of the year from the Text and Academic Authors Association.
With more than 30 years in the field, he has been a technical contributor, a technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently he is an independent consultant whose clients have included computer and
Table of Contents
- Part I: Planning for Privacy
- 1. Information Privacy Concepts
- 2. Security Governance and Management
- 3. Risk Assessment
- Part II: Privacy Threats
- 4. Information Storage and Processing
- 5. Information Collection and Dissemination
- 6. Intrusion and Interference
- Part III: Information Privacy Technology
- 7. Basic Privacy Controls
- 8. Privacy Enhancing Technology
- 9. Data Loss Prevention
- 10. Online Privacy
- 11. Detection of Conflicts In Security Policies
- 12. Privacy Evaluation
- Part IV: Information Privacy Regulations
- 13. GDPR
- 14. U.S. Privacy Laws and Regulations